The Architecture phase purpose is to elaborate on the findings of the Preliminary Analysis ("PA") phase, to stabilize the architecture and to reconfirm feasibility. As such, the goal is to do enough to minimize rework in subsequent release development, while deferring detail decisions that do not affect stability nor feasibility. "Knowing when to stop" is a key skill. It requires a multi-disciplinary team to integrate business perspectives, architectural concerns and organizational change management issues as well as development strategies.

This learning event enables the learners to use Macroscope material to plan system architecture stabilization in their own situations.

An excellent time to take this course is about 4-6 weeks before the conclusion of the PA phase - because it clarifies work that can be deferred from the PA phase to this one.

End users are bringing consumer devices into the organization! iPhones, iPads, Tablets and Smartphones are now part of the corporate environment. New desktop technologies such as VDI, Tablets, Consumerization, among other pressures, are causing many IT environments to consider re-architecting their desktop infrastructure. Learn how to separate myths from facts, learn how to develop a strategy focused on meeting your users desktop requirements based on roles / personas, rather than implying that one technology fits all, and discover Microsoft and partner solutions that enable a Flexible Workstyle.

Learn how to make the magic from the keynote come to life for your organization. Get an overview of the key improvements in System Center 2012, the design principles for 2012, how those features will benefit your organization, and finally how you can implement within your organization to achieve business value.

Electric Utilities are significant users of Geographic Information Technology spending billions of dollars every year worldwide to plan, design, operate and manage their infrastructure with GIS.
This document describes the GIS related trends in Canada which can be applied or compared to Utilities and GIS around the globe.

Fujitsu can draw on its innovative and comprehensive hardware, software and services portfolio to develop personalized solutions for every customer. This is precisely where our strength lies: Fujitsu does not provide off-the-rack IT environments; instead we always find new and ambitious solutions, and together with our customers, develop tailored strategies.

This hacker tooltalk from the Fujitsu Edmonton Security Lab explores the Kismet open source Wi-Fi analysis tool. Learn how to set up a low cost Wi-Fi hacker lab, sniff unencrypted Wi-Fi packets without detection, and even crack WEP keys with Kismet.

The general objective for this learning event is to provide the participants with an overview of the expected skills and behaviors required from all Fujitsu consultants having to share their professional expertise with our valued customers